Information Governance

advertisement
Introduction to Information Governance e-learning module
Introduction to Information Governance for staff with
patient contact
Introduction
Headline News
In December 2007 it was widely reported in the national press that nine NHS
trusts had misplaced thousands of patient and staff records.
This was the latest in a series of data security incidents affecting
organisations ranging from HM Revenue and Customs to the DVLA.
Richard Vautrey, deputy chairman of the British Medical Association's
committee of GPs, told the BBC that:
"Patients need to be absolutely confident that the information that is held
securely cannot be lost in some haphazard way as appears to be the case.”
In such a sensitive climate, good Information Governance (IG) is very
important and impacts on all of our jobs.
In this introductory level module you will look at the principles and procedures,
in short ‘the rules’ that can help you to manage information safely and
effectively.
Information Governance and you
Put simply, Information Governance is to do with the rules that should be
followed when we process information. It allows organisations and individuals
to ensure information is processed legally, securely, efficiently and effectively.
IG applies to all the types of information which your Organisation may
process, but the rules may differ according to the type of information
concerned.
In this module you’ll look at how you can make sure you follow the right
processes and procedures when you process information – in other words,
how to practise good Information Governance (IG).
1
16/02/2016
Introduction to Information Governance e-learning module
You will find out about:


How to avoid breaching confidentiality law and guidelines
How to comply with data protection and freedom of information
legislation
 What support you have - the IG Toolkit
 Good record keeping
 Effective information security.
All of the above topics will give you good knowledge and skills to provide an
effective, confidential and secure healthcare service. You will also find out
about the IG Toolkit and how your contribution to IG best practice in your
organisation is very important.
Information defined – personal data
There are different types of data, listed below. What type of information do
you think details of a patient's mental health condition in their medical file
would be classed as?
Think of the type of data you think it is, and explore the other two options.
Personal Information – e.g. medical records, staff records
This is the right option.
Information about individuals is personal information when it enables an
individual to be identified or non-personal when it doesn’t. This isn’t always
straightforward to establish but it is an important distinction in law. For
example, a person’s name and address are clearly personal information when
presented together, but an unusual surname may itself enable someone to be
identified.
Personal information may be held subject to obligations of confidentiality and
may be legally sensitive as defined by the Data Protection Act 1998.
Personal information is classed as confidential if it was provided in
circumstances where an individual could reasonably expect that it would be
held in confidence, e.g. the doctor/patient relationship. Confidentiality is
generally accepted to extend after death.
Personal information may be classed as legally sensitive when it makes
reference to particular matters, such as health, ethnicity or sexual life that are
listed in the Data Protection Act. Other details, for example an individual’s
bank account details would also be regarded as sensitive by most people but
are not legally sensitive. A further limit on the Data Protection Act is that it
only applies to personal information about living individuals.
2
16/02/2016
Introduction to Information Governance e-learning module
Person-based but anonymous information – e.g. public health statistical
information that does not identify an individual
This isn't the right option.
Person-based anonymised information does not identify an individual directly
and cannot be reasonably used to determine identity. The mental health
conditions in this case would not be classed as person-based anonymised
information as they are clearly linked with the individual's name and address
etc.
It is important to be aware that person-based but anonymised information is
not subject to the same restrictions on processing as personal information.
This is because no-one can be harmed or reasonably distressed by its
disclosure. Neither confidentiality law nor the Data Protection Act applies to
person-based information that has been effectively anonymised. This means
that taking steps to anonymise information is often very important as it
enables information to be processed without having to satisfy strict legal
requirements.
Corporate data – e.g. Trust accounts or statistical reports
This isn't the right option.
The mental health conditions in this case would not be classed as corporate
data.
Documents or information that are not about individuals are clearly not
personal information but may be classed as commercially confidential e.g. for
commercial reasons or because they contain legal advice. They may also be
regarded as sensitive in a general sense because of the subject matter. An
important consideration in relation to documents is whether or not they have
to be disclosed when a Freedom of Information Act request is made and
where they are confidential or sensitive they may be exempt from disclosure.
Information defined – personal data
There are different types of data, listed below. What type of information do
you think details of a patient's mental health condition in their medical file
would be classed as?
3
16/02/2016
Introduction to Information Governance e-learning module
Information Governance standards
You’ll look at Information Governance standards in more detail later in this
module, but at this stage it is worth noting that they are derived from the
following:
The Confidentiality NHS Code of Practice and the NHS Care Record
Guarantee for England
The Code tells you how to comply with the common law duty of confidentiality.
The Guarantee tells patients how the NHS will use and protect the information
in their health records.
You will learn more about confidentiality in topic 1.
The Data Protection Act 1998
The Act sets rules for how personal data is obtained, held, used or disclosed.
You will learn more about the Data Protection Act in topic 2.
The Freedom of Information Act 2000
The Act sets rules for disclosure of information about the work carried out by a
public sector organisation.
You will learn more about the Freedom of Information (FOI) Act in topic 3.
The Records Management NHS Code of Practice
The Code includes guidelines about how records, including health records,
should be used and disposed of.
You will learn more about how records management applies to your role in
topic 4.
The Information Security NHS Code of Practice
The Code sets out, at a high level, how organisations should comply with
information security principles.
You will learn more about how you can keep information secure in topic 5.
4
16/02/2016
Introduction to Information Governance e-learning module
The Information Governance Toolkit
To help improve Information Governance across the NHS in England, the
Department of Health determined a set of key standards. These are now
mandatory for NHS organisations to carry out as an annual self-assessment.
Annual reports
The annual reports are monitored and approved through the Information
Governance Toolkit, hosted and managed by the NHS Connecting for Health
(CFH) Information Governance Policy Team.
Who can view performance?
NHS CFH then send the results to the Healthcare Commission to contribute to
the Annual Health Check returns, for reference and potential audit and to the
National Information Governance Board, the body responsible for driving
improvements in information governance across health and adult social care.
The Information Governance Toolkit standards and approved organisation
reports can be found on the public-facing website:
www.igt.connectingforhealth.nhs.uk.
Who is involved?
There is a lead in your organisation that is responsible for carrying out this
annual assessment and collating evidence. In order to help your organisation
perform better it is necessary for all staff to be involved. Do your part in
complying with Information Governance standards and best practice
guidelines, and follow your organisation's policies.
The assessment involves the contribution of the whole organisation, including
you. Keep informed about your organisation's Information Governance
agenda and find out who your Information Governance Lead is.
At this stage you will begin to see how Information Governance is a cultural
agenda, which is every employee’s responsibility.
5
16/02/2016
Introduction to Information Governance e-learning module
Your responsibilities
Information Governance (IG) helps to ensure that all staff know their
responsibilities and comply with the law and best practice when processing
information.
You’ll look at your responsibilities in some detail throughout this module, but
in summary they include:

Providing a confidential service to patients, sharing information lawfully
and appropriately

Processing information in accordance with the ‘data protection rules’
and respecting the rights of individuals

Complying with Freedom of Information requirements

Recording information accurately and ensuring it is accessible when
needed

Ensuring that information is held securely.
Information Governance sets common guidelines that help NHS staff know
they are working to the same standards as people outside their own area.
Confidentiality
Celebrity spotted!
It’s late one Friday afternoon in a county hospital.
A celebrity is rushed into surgery for the
emergency removal of his appendix.
Several hospital staff spot the celebrity and some
of them look up the case notes, which includes a
history of depression. That evening, on the phone
to a friend, one of the staff mentions the surgery
and other health issues the celebrity has.
The next morning, the story of the star's
depression and surgery is splashed all over the
front covers of the tabloids.
6
16/02/2016
Introduction to Information Governance e-learning module
With pressure from the celebrity’s lawyer
threatening to sue the hospital unless all the
culprits are found and disciplined, things are
looking very bleak.
Best practice?
The Hospital carries out an internal
investigation to identify the staff member that disclosed the information, as
well as the staff who viewed the record. If they were not directly involved with
the patient's care, what actions were the staff members not justified in doing?
Select and think about two or more options.



Viewing the patient’s healthcare record
Sharing information relating to the patient’s upcoming surgery
Disclosing information relating to the patient’s past healthcare history
Confidentiality
To help prevent the kind of breaches in confidentiality seen in this scenario,
there are certain procedures to follow.
Duty of confidence A duty of confidence arises when sensitive information is
obtained and/or recorded in circumstances where it is reasonable for the
subject of the information to expect that the information will be held in
confidence.
Patients provide sensitive information relating to their health and other matters
as part of their seeking treatment and they have a right to expect that we will
respect their privacy and act appropriately. The duty can equally arise with
some staff records, e.g. occupational health, financial matters, etc.
Patients have a right to be informed about how we will use their information
for healthcare, the choices they have about restricting the use of their
information and whether exercising this choice will impact on the services
offered to them.
7
16/02/2016
Introduction to Information Governance e-learning module
Explicit consent Where it is proposed that patient information is disclosed
outside of the organisation for purposes other than healthcare, in most cases
it is necessary to ensure that the patient has explicitly consented to this
happening. There are limited exceptions to this general rule.
Legal requirement Always remember confidentiality is a legal requirement,
supported by the confidentiality clause in your contract and, where applicable,
your professional code of conduct. Your organisation is required to:

Inform patients about how personal
information relating to them will be
used

Inform patients of their right to
object to the disclosure of their
confidential personal information
outside of the organisation

Seek explicit consent before disclosing patient personal information for
non-healthcare purposes (unless rarely an exception applies).
The Caldicott Guardian
To help maintain levels of confidentiality throughout the NHS, a report was
commissioned in 1997 by the Chief Medical Officer.
One of the key outcomes of this report was that Caldicott Guardians were
appointed in each NHS Trust, in order to safeguard access to patientidentifiable information.
The Caldicott Guardian is normally at Board or Senior Management level as
they are responsible for reviewing, overseeing and agreeing policies
governing the protection of patient or personal information. The Caldicott
Guardian also takes responsibility for overseeing organisational compliance
with the Caldicott Management Principles.
Find out who your Caldicott Guardian is within your organisation.
8
16/02/2016
Introduction to Information Governance e-learning module
The Confidentiality Caldicott Principle Guidelines
A key recommendation of the Caldicott report was that staff justify every use
of confidential information and routinely test it against six principles. Never
disclose confidential information if you are unsure about your response to any
of these six questions.
Do you have a justified purpose for using this confidential information?
The purpose for using confidential information should be justified, which
means making sure there is a valid reason for using it to carry out that
particular purpose
Are you using it because it is absolutely necessary to do so?
The use of confidential information must be absolutely necessary to carry out
the stated purpose.
Are you using the minimum information required?
If it is necessary to use confidential information, it should include only the
minimum that’s needed to carry out the purpose.
Are you allowing access to this information on a strict need-to-know
basis only?
Before confidential information is accessed, a quick assessment should be
made to determine whether it is actually needed for the stated purpose.
If the intention is to share the information, it should only be shared with those
who need it to carry out their role.
Do you understand your responsibility and duty to the subject with
regards to keeping their information secure and confidential?
Everyone should understand their responsibility for protecting information,
which generally requires that training and awareness sessions are put in
place.
If the intention is to share the information, those people must also be made
aware of their own responsibility for protecting information and they must be
informed of the restrictions on further sharing.
Do you understand the law and are you complying with the law before
handling the confidential information?
There are a range of legal obligations to consider when using confidential
information. The key ones that must be complied with by law are provided by
the common law duty of confidentiality and under the Data Protection Act
1998.
If you have a query around the disclosure of medical or other confidential
personal information you should go to your Line Manager initially then the IG
Manager if you are still not sure. For serious and complex issues your
Manager should contact the Caldicott Guardian for advice and guidance.
9
16/02/2016
Introduction to Information Governance e-learning module
Providing a Confidential Service
As well as the Caldicott Guidelines, you can also refer to the Confidentiality
NHS Code of Practice model known as ‘Protect, Inform, Provide Choice and
Improve’ to help maintain a confidential service within your organisation.
Always look to improve the way
you and the organisation protect,
inform and provide choice to the
patient, clients and employees. You
can do this by attending regular
update training, seeking line
manager support and by reporting
possible breaches.
You can find out more about this
model within the Confidentiality
NHS Code of Practice in the section
Read more about it.
Always look to improve the way you and the organisation protect, inform and
provide choice to the patient, clients and employees. You can do this by
attending regular update training, seeking line manager support and by
reporting possible breaches.
You can find out more about this model within the Confidentiality NHS Code
of Practice in the section Read more about it.
Provide choice for patients to decide whether their information can be
disclosed.
Patients have the right to object to information they provide in confidence
being disclosed to a third party in a form that identifies them.
As long as the patient is competent to make such a choice and where the
consequences of the choice have been fully explained, their decision should
be respected.
You should protect a person’s information by recording relevant data
accurately, consistently and keeping it secure and confidential.
Write patient records appropriately – free of jargon or offensive, subjective or
opinionated statements.
Inform a patient how their information is used and when it may be disclosed.
Where practical, provide patients with information leaflets about the
organisation's confidentiality vows, or posters informing patients what the
organisation does with patient information and why.
Also, inform patients of their right to access their health records.
10
16/02/2016
Introduction to Information Governance e-learning module
Summary
You’ve now completed the topic on confidentiality.
Confidentiality is key to Information Governance, and the models you’ve
looked at should help you improve your awareness.
In particular, you can refer to:

the Caldicott Guardian in your organisation

the six Caldicott management principles

the ‘Protect, Inform, Provide Choice and Improve’
model for providing a confidential service to
patients.
In the next topics we will look at the Data Protection and Freedom of
Information Acts.
Data protection
Data protection issues can crop up in any
organisation.
Breaches often occur because staff are unaware of
data protection principles, which are contained in the
Data Protection Act 1998.
In this topic you are going to look at a series of data
protection issues that may occur in the everyday
running of an organisation.
.Data protection and the law
The Data Protection Act 1998 applies to all
organisations in the UK that process
personal information.
The Act goes hand-in-hand with the
common law duty of confidence and
professional and local confidentiality codes
of practice to provide individuals with a
statutory route to monitor the use of their
personal information.
A breach of one of the eight Data Protection Principles can result in legal
action being taken against an individual and/or the organisation. Learning the
Principles of the Data Protection Act is therefore very important.
There are additional offences under section 55 of the Act of unlawfully
obtaining, disclosing or selling personal data. You will explore the Principles
and the effects of section 55 in more detail later in this topic.
11
16/02/2016
Introduction to Information Governance e-learning module
Data protection principles
There are eight principles that must be followed when handling personal
information. Take a look at the list below. Which do you think are not real data
protection principles?
1.
2.
3.
4.
5.
Processed Fairly and Lawfully
Processed for a Specified Purpose
Adequate, relevant and not excessive
Processed under supervision
Permanently kept on record for future reference
Summary of the data protection principles
Here's a quick summary of the first four of the eight principles.
1. Processed fairly and lawfully
Ensure that the proposed use of the information is lawful in the widest sense,
e.g. doesn't breach other legal restrictions such as the common law duty of
confidentiality.
Inform patients why you are collecting their information, what you are going to
do with it, and who you may share it with.
Information recorded as part of the process of providing care should not be
used for purposes that are unrelated to that care.
There should be no surprises! Be open, honest and clear.
The same principle applies to the personal information of staff.
2. Processed for a specified purpose
Only use personal information for the purpose for which it was obtained.
Only share information outside your organisation, team, ward, department, or
service if you are certain it is appropriate and necessary to do so.
If in doubt, check first!
3. Adequate, relevant and not excessive
Only collect and keep the information you need.
Do not collect information “just in case it might be useful one day!" You cannot
hold information unless you know how it will be used and it is a justified use.
Explain all abbreviations, use clear legible writing and stick to the facts –
avoiding personal opinions and comments.
4. Accurate and kept up-to-date
Take care when entering data to make sure it is correct.
Make sure you check with patients that the information is accurate and up-todate. Check existing records thoroughly before creating new records and
avoid creating duplicate records.
12
16/02/2016
Introduction to Information Governance e-learning module
Summary of the data protection principles – continued
Here's a quick summary of the rest of the eight principles.
5. Not kept for longer than necessary
Follow retention guidelines set out by the Records Management NHS Code of
Practice and your organisation’s retention policy.
Make sure your information gets a regular "spring clean" so that it is not kept
“just in case it might be useful one day!” Dispose of information correctly,
according to your organisation's disposal policy.
6. Processed in accordance with rights of data subject
Individuals, whether staff or patients, have several rights under the Act.
In summary individuals have:





the right of access to personal data held about them
the right to prevent processing likely to cause damage or distress
the right to have inaccurate data about them corrected, blocked or
erased
the right to prevent processing of information about themselves for
purposes of direct marketing
rights in relation to automated decision-taking.
The rights are not absolute, that means there may be occasions where the
organisation is permitted to override them.
Later in this module you will explore the rights in more detail.
7. Protected by appropriate security
This requires that all organisations that process personal information have
security measures in place to ensure that the information is protected from
accidental or deliberate loss, damage or destruction.
Your organisation will have a security policy and processes to ensure the
security of personal information. They will also have guidelines for staff about
how to ensure personal information is protected from unauthorised access.
You must make sure you comply with all the security processes and
guidelines so that access to personal information is only available to those
authorised to do so, and information is not accidentally or deliberately lost,
damaged or destroyed.
13
16/02/2016
Introduction to Information Governance e-learning module
Some of the measures you should comply with are:





Only send confidential faxes using safe haven or secure faxes
Ensure confidential conversations cannot be overheard
Keep your passwords secret
Lock paper files away when they are not in use
Transport personal information by secure methods
You will learn more on keeping information secure in the Information Security
topic of this module.
8. Not transferred outside the EEA without adequate protection
You’ll learn more on keeping information secure in the Information Security
topic of this module.
If sending personal information outside the
European Economic Area (EEA), make sure
consent is obtained where required and ensure
the information is adequately protected.
Be careful about putting personal information
on websites, which can be accessed from
anywhere in the world - get consent first.
Check where your information is going, and know where your suppliers are
based.
Principle 1: Processing conditions
As you have just seen, Principle 1 of the Data Protection Act requires that
personal data is processed fairly and lawfully. It also requires that personal
data is only processed if one of the conditions in the Act is also met.
Processing conditions
There are several of these “processing conditions”, but the main ones that you
need to be aware of when providing care and treatment are processing:



for medical purposes
where the patient has given their explicit consent
to protect the vital interests of the patient or another person.
Processing for medical purposes
This means that sensitive personal data can be processed for the purposes of
preventative medicine, medical diagnosis, the provision of care and treatment
and the management of healthcare services.
Explicit consent
If you wish to process patient information for purposes other than healthcare,
in most cases you must have the explicit consent of the patient to do so
14
16/02/2016
Introduction to Information Governance e-learning module
Vital interests
In exceptional circumstances, e.g. life or death situations, processing of
sensitive information for non-healthcare purposes without consent is
permitted.
Principle 6: Compliance with the rights of individuals
Earlier, you saw a summary of individual’s rights under Section 7 of the Data
Protection Act. Now you’ll look at the rights that may be most relevant to your
organisation.
.
Subject access requests
Generally, individuals have the right to see information about them held by an
organisation that is processing their personal data. Applications, which are
known as “subject access requests” must be in writing and the individual
should provide the organisation with sufficient information to enable their
records to be correctly identified. The request must be complied with within 40
days of receipt but wherever possible information should be provided within
21 days.
Therefore, if you receive a request for information, you should promptly
forward it to the person in your organisation that has responsibility for subject
access requests. Make sure you know who has this responsibility in your
organisation.
If you are the nominated person, you should ensure that staff members are
aware that subject access requests should be forwarded to you promptly.
If you require further advice about handling subject access requests, your IG
Lead should be able to help you.
You’ll explore a scenario about complying with a subject access request later
in this topic.
The right to prevent processing likely to cause damage or distress.
The individual is entitled to send a written notice to an organisation requesting
that processing of their data stop, or does not begin. The individual must be
able to show that he/she has suffered or would suffer substantial and
unwarranted damage or distress if the processing goes ahead.
The organisation doesn’t have to comply where the organisation believes the
processing is so important it must go ahead even though it causes damage or
distress.
15
16/02/2016
Introduction to Information Governance e-learning module
Rectification, blocking, erasure and destruction
An individual who believes that an organisation has recorded inaccurate
personal information about them is entitled to apply to the court to have the
information corrected or removed.
This right applies to factual information only, not to opinions or a diagnosis
that the patient disagrees with or which turns out to be wrong.
Rights in relation to automated processing
The individual can ask for your organisation to ensure that no decision which
is taken by or on behalf of the organisation and significantly affects the
individual is based solely on information processed by automatic means.
Scenario 1: Unexpected news
Now it's time to see what can happen when these
principles are ignored... Mr Jones answers his mobile
phone one Tuesday morning to a call from the local
hospital.
Hospital staff: "... No, calm down Mr Jones. This is just to
let you know that your wife Sally is in labour - her waters
broke an hour ago."
Mr Jones: "Oh. She's my ex-wife, actually. She ran off
with my ex-best mate 5 years ago."
Mr Jones: "No, I'm definitely no longer her Next of Kin.
The divorce was finalised a while ago."
Unexpected news - question
Which two of the eight data protection principles are being breached in this
scenario?
 Principle 1: Processed fairly and lawfully
 Principle 2: Processed for a Specified Purpose
 Principle 3: Adequate, relevant and not excessive
 Principle 4: Accurate & kept up-to-date
 Principle 5: Not kept for longer than necessary
 Principle 7: Protected by appropriate security
16
16/02/2016
Introduction to Information Governance e-learning module
Scenario 2: Subject access request
Mrs Foster has written asking for a copy of all her health records held by the
local general hospital. The Data Protection Lead opens the letter and puts it
on top of his to-do pile. Later the pile is accidentally knocked over and the
letter slips behind the desk.
After two months Mrs Foster contacts the hospital to ask what is happening
with her request. She is put through to the Data Protection Lead’s extension,
and hears a voicemail that the Lead is on holiday. The call is put back through
to switchboard and Mrs Foster enquires whether there is anyone else that can
help her. Unfortunately, the switchboard operator has never heard of
Information Governance so is unaware that there is anyone else she can refer
Mrs Foster to.
She puts the call through to Trust Headquarters and one of the staff there
takes Mrs Foster’s details and promise to get back to her. No-one does.
Seven days pass and Mrs Foster has still not been contacted, so she decides
to ring the Information Commissioner to complain.
.
Subject access request – question
Which of the following data protection principles is being breached in this
scenario?
Principle 1: Processed fairly and lawfully
Principle 3: Adequate, relevant and not excessive
Principle 4: Accurate & kept up-date
Principle 6: Processed in accordance
Principle 7: Protected by appropriate security
Principle 8: Not transferred outside the EEA without adequate protection
17
16/02/2016
Introduction to Information Governance e-learning module
Scenario 3: An administrative error
Sharon, a health records assistant, has to check 100
health records at random to make sure they have the
correct NHS number.
She decides that there is not
enough space in her office to do the task comfortably...
...so she finds a quiet meeting room in the Post Grad
Centre to do it instead.
She pops out to a cafe for lunch, leaving the notes
unattended and the room unlocked.
An administrative error - question
Which one of these data protection principles might have been breached in
this scenario?
Principle 1: Processed fairly and lawfully
Principle 3: Adequate, relevant and not excessive
Principle 5: Not kept for longer than necessary
Principle 7: Protected by appropriate security
Principle 8: Not transferred outside the EEA without adequate protection
Scenario 4: A compliment?
Miss Ford has requested to look at her health records held by the local
general hospital.
The hospital arrange for her to visit and go through
the records with a health professional on hand to
explain any abbreviations or complex medical issues.
Whilst reading one of the entries written many years
ago, Miss Ford points out a strange abbreviation,
“What does NLL stand for?”
The health professional responds, “Hmm, I think it means “Nice Looking
Legs!”
18
16/02/2016
Introduction to Information Governance e-learning module
Scenario 4 A compliment? – question
Which of the following data protection principles is being breached in this
scenario?
Principle 1: Processed fairly and lawfully
Principle 3: Adequate, relevant and not excessive
Principle 4: Accurate and kept up to date
Principle 6: Processed in accordance with rights of
data subject
Principle 7: Protected by appropriate security
Principle 8: Not transferred outside the EEA without adequate protection
Scenario 5: Foundation Hospital status
The Mental Health Trust is considering applying for
Foundation Hospital status.
The Communications team want to do a mail shot
to tell all staff about the proposal.
They ask the Human Resources department to provide
a list of the staff’s home addresses so they can send out
the mail shot.
The Human Resources department refuses to supply the information.
Scenario 5 – question
Which two of the eight data protection principles would have been breached if
the information had been supplied?
Principle 1: Processed fairly and lawfully
Principle 2: Processed for a specified purpose.
Principle 4: Accurate & kept up-to-date.
Principle 5: Not kept for longer than necessary
Principle 7: Protected by appropriate security.
Principle 8: Not transferred outside the EEA without
adequate protection.
19
16/02/2016
Introduction to Information Governance e-learning module
Scenario 6 – Transcription service
A company that specialises in data transcription has contacted the Trust.
The company is based outside of the European
Economic Area (EEA) and is offering a costeffective transcription service. This seems a great
opportunity and the Trust decides to trial the
service offered. It sends a set of dictation tapes
through a secure courier to the overseas address
provided.
In accordance with the trial the company transcribes the information, puts it on
an encrypted DVD and returns it to the Trust. Shortly afterwards two patients
contact the Trust to complain that they have been contacted by a drugs
company offering them condition-specific medicines.
Scenario 6 question
Which of the eight data protection principles is being breached in this
scenario?
Principle 1 Processed Fairly and Lawfully
Principle 2 Processed for a Specified Purpose
Principle 3 Adequate, relevant and not excessive
Principle 4 Accurate and kept up to date
Principle 5 Not kept for longer than necessary
Principle 8 Not transferred outside the EEA without adequate protection
Scenario 7: Retaining records
Meg is a new ward clerk at the general hospital. She has been asked to check
the storage room and dispose of any old patient admission books.
Each book comprises over 100 records containing a patient’s name, address,
hospital number, consultant, admission reason, and dates of admission and
discharge.
20
16/02/2016
Introduction to Information Governance e-learning module
The ward manager asks her to get rid of any books which are more than 10
years old.
The store-room contains dozens of the books and Meg finds two that are over
12 years old. This exceeds the recommended maximum 8 year retention
period in the Records Management NHS Code of Practice.
Scenario 7 question
Which of the eight data protection principles is being breached in this
scenario?






Principle 1: Processed Fairly and Lawfully
Principle 4: Accurate & kept up-to-date
Principle 5: Not kept for longer than necessary
Principle 6: Processed in accordance with rights of data subject.
Principle 7: Protected by appropriate security
Principle 8: Not transferred outside the EEA without adequate
protection.
Scenario 8: Information for sale
James is an administrations clerk at the local general hospital, currently
involved in patient registrations. One morning on his way to work he is
approached by a man claiming to be a private detective hired to locate the
beneficiary of a will.
The detective explains to James that he believes the woman is living in the
area and could possibly be a patient of the Trust. He asks James to look
through the registration records and supply the woman’s address if she is
registered.
21
16/02/2016
Introduction to Information Governance e-learning module
James knows he shouldn’t really do this, but the detective assures him that
the woman will be pleased that he has helped. He also offers James £100 if
he provides the information before the end of the working day.
James locates the details, but speaks to a colleague before handing them
over. He tells James that he has broken rules just by accessing the details
and advises him to inform the IG team and the hospital security team about
the detective.
Information for sale - question
Would James have breached the Data Protection Act by providing this
information?
No, the woman would want to know that she had been left something in the
will.
It depends whether he accepts the £100.
No, James would have only provided the woman’s address, this isn’t personal
data.
Yes, James would have unlawfully disclosed personal data.
Summary
You have now reached the end of this topic on the Data Protection Act.
Hopefully, you now have a good idea of what the Act requires from you in
terms of personal data processing. By working through the scenarios in this
topic, you have looked at how the Data Protection Act applies in practice.
In the next topic you are going to look at another Information Governance
legal obligation – the Freedom of Information Act 2000.
The Freedom of Information Act 2000
22
16/02/2016
Introduction to Information Governance e-learning module
If you received a letter from a patient requesting a detailed breakdown of your
organisation's expenditure for the year, would you know what to do?
The Freedom of Information (FOI) Act 2000 requires disclosure of information
by public authorities, such as NHS Trusts, County Councils and Government
departments.
Exemptions
There are several exemptions within the Act, which are circumstances where
you will not have to provide the requested information.
The exemptions you may need to know about are where:

the applicant could easily obtain the requested information from
elsewhere
 the organisation already has published or has firm plans to publish the
information
Or where the information:



relates to confidential business information
is personal information about the applicant
is personal information about someone other than the applicant and
disclosure of it would breach either the Principles or section 10 of the
Data Protection Act 1998, e.g. it is confidential to a third party.
Unless an exemption applies, information must be supplied if a request is
received.
Spotting a request
The FOI Act allows anyone to write to any public authority to ask for
information to be provided to them. Which of the letters displayed do you think
is an FOI request for information, A or B?
 A - David's letter
 B - Sarah's letter
23
16/02/2016
Introduction to Information Governance e-learning module
What you need to know about FOI
First of all, take a look at the basic principles behind FOI:
Types of information
The FOI Act gives the public the right to request any information held by any
type of public authority or by persons/organisations providing services for
them.
This includes educational institutions, NHS Trusts and contractors, Local
Authorities etc.
The public can request information held within things like minutes of meetings,
work emails, work diaries, corporate reports and other work documents.
Exemptions may apply for certain information, which therefore would not be
disclosed.
Form of request
Requests for information must be made in writing but there is no need for the
applicant to mention the FOI Act.
If a patient or member of the public asks you for information that you think is
covered by the FOI Act, you should ask them to put their request in writing or
assist them to do so.
One of the underlying principles of the FOI Act is that the identity of the
applicant is not taken into account, however in some circumstances it can be
relevant, and an applicant should therefore provide their real name and a valid
address for correspondence (either postal or email) so that the request can be
processed in accordance with the requirements of the FOI Act.
Processing requests
If you receive a request for information, you should promptly forward it to the
person in the organisation that has been assigned responsibility for FOI
requests. Make sure you know who has this responsibility in your
organisation.
You will learn more about processing requests on the next screen.
24
16/02/2016
Introduction to Information Governance e-learning module
Response time
Generally, the organisation must comply with requests for information within
20 working days.
If the organisation decides not to provide the requested information the
applicant must be informed of this and in most cases he/she must also be told
why the information has been withheld.
Exemptions
There are several circumstances under which information should not be
disclosed, and earlier you had a brief look at some of the ones most
applicable to your organisation.
Unless you are the person nominated to respond to FOI requests, you will not
have to take decisions on whether information should be withheld.
If you are the responsible person, you can obtain further advice from the
Information Commissioner’s Office at: www.ico.gov.uk
Breaches of the Act
A criminal offence is committed if requested information is altered, defaced,
blocked, erased, destroyed or concealed with the intention of preventing
disclosure of any or part of the information.
Liability
Both your organisation, i.e. the legal entity, and the employee that prevented
disclosure of information are liable to conviction.
The Information Commissioner can take action through the issuing of notices
if a complaint is received about the way a request for information has been
handled.
Information notices
The Information Commissioner can issue an information notice that requires
the organisation to provide information relating to the particular request that
has resulted in the complaint.
Enforcement notices
If the Information Commissioner believes that an organisation is not
complying with the Act, he can issue an enforcement notice requiring
compliance within a set timescale. This might relate to providing information
that has been incorrectly withheld.
Decision notices
Here the Information Commissioner can issue a decision notice stating that a
request for information has or has not been properly handled. If the decision is
25
16/02/2016
Introduction to Information Governance e-learning module
that the organisation has not handled a request adequately, the Information
Commissioner will set out the steps that need taking to ensure compliance.
Failure to comply
If an organisation fails to comply with any one of the notices issued, the
Information Commissioner can refer the matter to the High Court who can
deal with the matter as contempt of court.
The Act in practice
Have a look at the two case studies on the following screens.
You are going to see examples of members of the public requesting
information and will be asked questions in each case, so pay close attention
to what is happening.
Remember to consider what constitutes an FOI request and also any
breaches of the FOI Act in each case.
Case study 1: A call to action?
The Trust receives a phone call from an anonymous source requesting details
about the Trust’s annual income and expenditure report.
Caller: "Hi, yeah. My name's Jeff and I want to know how much money the
hospital makes and your general expenditure. I want exact amounts and
would like you to get me the details by the end of the week."
The receptionist advises him to put his request in writing to the hospital and
informs him that a response will follow once the request is received.
Later that day, the patient advisory liaison service team (PALS team) receives
an email requesting the information. They forward the email to the person
responsible for dealing with FOI requests within the Trust, who decides there
is no need to disclose the information as it is readily available elsewhere and
they have firm plans to publish their next annual report.
A response is emailed to Jeff informing him that:

this information is within the Trust’s annual report, which is published
on the Trust’s website
26
16/02/2016
Introduction to Information Governance e-learning module
if he requires next year’s report, they have plans to publish this at the
end of the next financial year, usually by 6th April.
The response also contains the link to the Trust website.

Case study 1: Question
Select the reason you think the FOI Lead had for not sending the information
requested once the written request was received.

The applicant didn’t give their name.

The applicant made the request by telephone.

Information was accessible elsewhere

The applicant didn’t state that he was requesting the information in
accordance with the FOI Act
The applicant wasn't very polite

Case study 2: Art attack
A children's ward has recently been redecorated as part of a Care in the
Community project. A patient’s father is not happy with the equipment being
used in the ward.
Mr Heath, the father of one the patients, writes a letter to the hospital stating,
‘I find it outrageous that you have invested money in decorating the walls of
the ward when it could be much better spent on medical equipment.
‘I would like to know if the medical equipment in the children’s ward has been
PAT (Portable Appliance Testing) tested. Are procedures in place to ensure
this happens regularly and are there any plans to buy equipment in the near
future?’
27
16/02/2016
Introduction to Information Governance e-learning module
The Trust FOI lead sends a letter responding to Mr Heath informing him of all
policy and procedures in place for keeping portable medical equipment
maintained to the required standard.
Case study 2: Letter from the Trust FOI lead
The Trust FOI lead sent the letter to Mr Heath within one week after receiving
the written request.
He includes the following in the letter:



a link to these documents on the Trust publication scheme website
a copy of the most recent PAT report for this particular ward
a list of new equipment ordered and due to be delivered by March of
this year.
Case study 2: question
Was this FOI request dealt with efficiently and according to the terms of the
FOI Act?
Select an option feel free to make notes; answers will only be given once you
have logged on to the NLMS e-learning module
 Yes

No
Minimising complaints
Many of the complaints concerning FOI requests are about organisations not
responding to applicants in a timely fashion.
Because of the tight timescales it is vital that if you receive a request for
information you forward it to the person who has responsibility for FOI in your
organisation as soon as possible.
It is also important that you comply with good record keeping principles, such
as using logical file names for records and documents so that they can be
easily located if requested.
You will explore good record keeping in a later topic.
28
16/02/2016
Introduction to Information Governance e-learning module
Summary
You have now reached the end of this topic on the Freedom of Information
Act.
In this topic you have covered:







the basic principles of the FOI Act
the types of information that can be requested
how a request should be made
some of the exemptions that permit withholding of information
the short timescale for complying with a request
the criminal offence of intentionally preventing disclosure of information
the notices that can be issued by the Information Commissioner if an
applicant complains about how you handle a request
 the penalty for not complying with a notice from the Information
Commissioner.
If you are the nominated person in your organisation with responsibility for
dealing with FOI requests you may wish to seek more advanced training in
FOI and records management.
Good record keeping
Getting it right
Bob comes to A&E with a chronic breathing condition. The receptionist
completes an A&E card for him and finds out that he has attended A&E six
times in the last two months.
The Nurse checks the Patient Administration System for Bob’s case notes but
doesn’t seem to have any record of his previous visits.
The Consultant asks the medical records staff for Bob’s paper case notes, but
they cannot find them in the records library. They don’t have any tracking
system in place to know whether another consultant had requested the notes
and not returned them.
The filing guidelines had been neglected by the medical records team as they
have been too busy carrying out a housekeeping task to archive old records.
Files have been left in huge piles but in date order to be filed later when they
have time.
As a result Bob was admitted and a new set of paper records were created.
29
16/02/2016
Introduction to Information Governance e-learning module
Record keeping issues
There are several record keeping risks highlighted in Bob’s case.
Lack of history
The case notes from previous visits were not logged on the electronic system.
This can be a risk to patients as the lack of history means the next team of
clinical staff dealing with Bob’s care would not have all the information they
need.
What if Bob was unconscious? How would they have known about the
previous visits and missing case notes?
Medical records not tracked
The medical records staff were not working according to Trust guidelines.
Medical records are not being tracked when taken out and when returned to
the records library.
Case notes not filed in a timely manner
Case notes are left in heaps and not being filed in a timely manner, which
means that if a patient visits the hospital again soon after the first visit, key
information will be missing from their medical record, as in Bob’s case.
A duplicate record has been created
The final action to create a new medical record for Bob is necessary in this
case but represents very poor practice, as this means a duplicate record is
created with only a partial medical history. This could be a risk to the patient
and have a huge impact on the care delivered by the clinical team.
This topic will provide you with information about good record keeping and
about what you can do to ensure records are complete, accurate, and
available where and when needed.
What is a good record?
Which of the following do you think would make a good record?
 Legible writing
 Complete, i.e. all the
information in one place
 Including accurate information
 Easy to locate
 Written contemporaneously, i.e. at the time an event occurred
30
16/02/2016
Introduction to Information Governance e-learning module
Recording Quality Information
Commitment 8 of the NHS Care Record Guarantee promises patients that the
NHS will take appropriate steps to make sure personal information is
accurate. To meet this commitment you need to ensure that you have good
record keeping and ensure records are:
Accurate
Make sure that when you create a file or update a record the information you
are recording is correct and clear. Give patients the opportunity to check
records about them and point out any mistakes.
Ensure that any factual mistakes are corrected or where appropriate, reported
to your manager or a senior clinician.
Up-to-date
Ask patients to confirm their details when attending appointments and ensure
changes of address, name, next of kin details etc are updated as soon as
possible.
If your organisation has a formal procedure for updating records, make sure
you comply with it.
Complete, including the NHS Number
Incomplete or inaccurate healthcare information can put patients at risk. For
example, the lack of certain information could cause a patient to be given the
wrong treatment or advice.
Ensure patient records include their NHS number; as this helps ensure that
the correct record is accessed for the correct patient.
There is also a financial implication of keeping incomplete records.
All treatments carried out by your organisation are coded on the computer
system. If these codes are incorrect, or haven't been inputted, then there is no
record of them and the organisation will not be paid for them. The
organisation may also face allegations of fraudulent behaviour.
Quick and easy to locate
You need to make sure that records and the information within them can be
quickly located when required, e.g. by using a logical filing system that allows
easy retrieval of records.
Make sure you comply with any procedures that aim for consistent and
standardised filing of records, and for safe and secure records storage areas.
If there are no such procedures, speak to your line manager in the first
instance, then the Records Manager or IG Lead if necessary about ways of
ensuring efficient retrieval of records and the information contained within
them.
Free from duplication
31
16/02/2016
Introduction to Information Governance e-learning module
Good record keeping should prevent record duplication. Before you create a
new record, make sure that one doesn’t already exist.
Having more than one record for the same patient could increase risks, as
there may be missing vital information in one record. It would be pot luck
which record is accessible in an emergency situation.
Written contemporaneously
Good record keeping requires that information is recorded at the same time
an event has occurred or as soon as possible afterwards.
This means that records will be updated whilst the event, care or otherwise, is
still fresh in your mind.
Above all, remember: quality information is the key to better healthcare
services.
Good record keeping
There are other issues that you should be aware of and comply with to ensure
good record keeping in your organisation..
Using: When you are responsible for using a record containing personal data
you should make sure you comply with the Data Protection Act 1998 and the
common law duty of confidentiality, these were covered earlier in this module.
Be aware that individuals are able to gain access to their own personal
information under the Data Protection Act and to documents under the
Freedom of Information Act 2000. Make sure the information you add to
records and documents is legible, factual, complete and easy to locate upon
request.
Storage: Decisions about storage of health records are likely to be handled
by your Records Manager, Health Record Manager or your IG Lead. Your
organisation is likely to have a records management procedure so you can
refer to this for further guidance.
If you have a computer account you will be responsible for maintaining
effective document management within it. You should ensure you set up
folders with logical names and save electronic documents with file names that
reveal what information they contain. In addition, if you receive documents by
email, ensure you do not retain lots of attachments in your email account as
this can seriously affect the working speed of your account.
All of these measures will assist you to retrieve files when you need them.
Retention: When a record has achieved its purpose and no longer has any
justified use then it is considered closed. After a record has been closed, it
should be kept in line with the Record Management NHS Code of Practice
32
16/02/2016
Introduction to Information Governance e-learning module
retention schedule which will require you to archive or dispose of the record
within a certain timescale
When disposing of paper files, disks or CDs, especially those which contain
person identifiable information, you need to do so in the appropriate manner
and inline with your organisation's Records Management Policy. For example,
in the confidential waste bin, incineration, NHS approved shredder etc.
You should also regularly review your electronic files and emails and make
decisions about whether you need to keep a document or email any longer. If
it’s no longer needed, consider disposal, either through moving it to an archive
file or deletion.
What's the best approach?
Which of the following statements shows the correct approach to managing a
record?
“We keep track of records from start to finish, and always destroy them when
they are no longer needed by the Hospital.”
“We keep track of records from start to finish, and always make decisions on
how long a record should be kept, at each point of review, throughout the life
of the record.”
“We keep track of records from start to finish, and always keep all records for
at least 100 years in case they are needed in the future.”
Summary
You have finished this topic on good record keeping.
You have looked at:


appropriate record keeping
The importance of accuracy and completeness of records.
In the next topic you will look at keeping information secure.
Information security
Spot the security breach
33
16/02/2016
Introduction to Information Governance e-learning module
In your organisation, you are all responsible for keeping patient information
safe and secure. Can you spot the potential security breaches in each of
these situations?
“I really need to get on top of updating my patient records. I’ll just pop them
onto this memory stick to take home with me.”
“Can I borrow your security pass for a few minutes? I left mine at home!”
“My password is my girlfriend’s name. It’s easy for me to remember that way!”
Securing access to information
So, did you spot the security risks in this organisation?
The doctor is transferring patient information to a portable device to take
home with him.
The risk of theft of any portable media is high. But due to their size, memory
sticks are at a higher risk of being misplaced. If you have been authorised to
use a memory stick to transport patient information it should have encryption
applied beforehand.
You will look at maintaining security outside of the workplace later in this
topic.
Angelique has forgotten her door pass. She needs to get something from the
stock room so asks her colleague to borrow her pass.
Do not lend out your security pass to anyone else – not even to close
colleagues. Your pass is intended for you and your use only. You have no
control over the security consequences if it gets into the wrong hands, but you
will be identified by any audit trail as the individual who accessed the system,
room or area.
You will explore security in the workplace later in this topic.
David has chosen a password he can remember. What he doesn’t realise is
that anyone who knows him could easily guess it.
Always select a password that cannot be found out by anyone else.
34
16/02/2016
Introduction to Information Governance e-learning module
You will explore best practice for choosing a secure password later in this
topic.
What is information security?
Information Security is about ensuring information is:
Safe and protected
Information should be kept safe and protected at all stages during which it is
held by the organisation.
You looked at why information must be protected in topic 1 – confidentiality.
Information security is more concerned with how information is protected, for
example, using passwords, locks and security passes.
A reliable record
Information should be a reliable presentation of what was recorded, so that
people know they can make decisions based on it.
It is important that the information we use is a reliable presentation of what
was recorded, particularly personal information as this is used to provide care
and treatment. Implementing information security measures helps us to
ensure that information created or used is accurate, complete and not
tampered with.
Available to authorised people
Information should be available to those authorised to see it at the time they
need it.
The information security measures put in place must ensure those authorised
to use information have access to it where and when it’s needed.
Ensuring good information security.
What measures should you take to ensure that information is appropriately
protected so that access is controlled but the information is available to those
authorised to use it?
Stop others from viewing the information
Don’t leave paper records lying around; lock them away when they’re not
being used.
Return paper records to the correct storage area when no longer required so
that they are available if needed by someone else.
Keep electronic records password protected
Use a password-protected screensaver to prevent unauthorised access to
electronic records if you have to leave your computer unattended.
Log out and switch off your computer at the end of each day.
35
16/02/2016
Introduction to Information Governance e-learning module
Choose effective passwords
Choose a good password of at least 6 characters long, with a mixture of
letters, numbers and symbols.
Keep passwords secret and your smartcards safe. You’ll find out more about
creating an effective password later in this topic.
Avoid inappropriate disclosures of information
Make sure you don’t discuss sensitive information in inappropriate venues,
e.g. public areas of the organisation.
When you take phone calls ask patients to confirm personal information to
you rather than you reading their details out loud.
Ensure the premises are secure
Don’t leave key coded doors propped open.
If you’re the last to leave the building at the end of the working day, make sure
windows and doors are locked. If there is a burglar alarm make sure it is
turned on.
Seek advice from your IG Lead
Make sure you know who your IG Lead is and ensure that you seek his/her
advice on information security issues.
If you discover an actual or potential breach of information security, such as
missing, lost, damaged or stolen information and equipment make sure you
report it to your IG Lead.
Portable equipment and removable media
How else can you ensure information remains secure?
Only transfer personal information to removable media such as CDs, DVDs
and floppy disks if you have been authorised to do so.
Unauthorised access to the information should be prevented by the use of
encryption.
Look after portable equipment such as laptops, PDAs and memory sticks.
36
16/02/2016
Introduction to Information Governance e-learning module
If you’re travelling with them ensure you keep them within your sight at all
times. Where possible attach a memory stick to a key ring.
For more information on laptop security, please see the module on Secure
transfers of personal data.
Password management
David chose a password that was easy for anyone who knew him to guess.
The password you choose should be memorable but hard to guess. Which of
these would be the most effective password?




18feb1980
Reds
Dk9+jtb3sH*nw26w
#5~Lp4Y
Personal and acceptable use of IT equipment
Personal and acceptable use of the internet and email in your workplace may
be permitted to some extent. But what do you think is acceptable and
personal use, and when is it considered excessive?
Acceptable use
Sending, displaying or knowingly accessing offensive material is a breach of
the acceptable use policy.
You should not commit to email anything which you would be unhappy to sign
your name to in print.
Any non-work related email or documents, e.g. private emails, should be
stored in your email account or network folder clearly marked as ‘Personal’.
Your organisation will have internet filters in place to help block offensive
sites, but if you do come across any while doing legitimate work you should
inform your ICT Services.
Personal use
IT facilities such as the internet and email have been provided by your
organisation primarily for business purposes.
In most organisations, limited personal use of these facilities is generally
permitted during lunch breaks and after work hours.
However, not all organisations allow personal use, so please check with your
IG Lead or Information Security Officer before you start shopping online!
Excessive personal use
37
16/02/2016
Introduction to Information Governance e-learning module
Excessive personal use or inappropriate use of the IT systems is a
disciplinary offence.
If your organisation has an acceptable use policy, excessive or inappropriate
use will be defined in it, so read the policy.
If there is no written policy, speak to your IG Lead or Information Security
Officer.
In general, it will cover such things as accessing or downloading pornographic
images, or carrying on a business using the organisation’s email and other IT
facilities or sending harassing or offensive emails, etc.
Appropriate use of email
Every morning David’s inbox is full of Spam. What should he do with these
emails?.




Reply and tell them to stop sending them
File them in a folder marked ‘Spam’
Delete them without opening
Forward them if they look interesting
Audit trails and reporting security breaches
Why is it important that everything you do on a computer, including emails
and internet use, can be tracked?
Where breaches of security, the law or the acceptable use policy are
suspected, this tracked data can be used to aid an investigation.
Any incident, however small, wastes time and often requires work to be
repeated. It also poses a risk to individuals or the organisation.
38
16/02/2016
Introduction to Information Governance e-learning module
We can make improvements to security by reporting any breaches through
the incident reporting process in your organisation.
Installing software
David has reported a virus to Angelique. Whilst waiting he downloads antivirus software from the internet onto his computer. Should he do this?


Yes
No
Malicious code and unauthorised software
So, by installing software yourself, you risk infecting the system with malicious
code and potentially creating licensing issues for the organisation. Here is
some advice about the issues and what you can do to counter the risk of
either
occurring.
Malicious code
Malicious code includes computer viruses and spyware, and the effects will
vary depending on which you have downloaded. Some malicious code will
just waste time while another can destroy data or even allow another user to
gain access to your computer. Email attachments you receive may also
contain malicious code.
To combat some malicious code, your organisation has an anti-virus system
that will catch most incoming viruses on emails. You can help by being
extremely cautious of opening email attachments from people you don’t know.
Remember: Do not download software from the internet, from free CDs etc,
unless you have been authorised to do so. If in doubt get advice from your
ICT Services helpdesk or IG Lead or Information Security Officer.
Unlicensed software
Software includes any programs and games you download from the internet,
on floppy disk, CD or any other storage media.
Your organisation will have processes regarding the installation of such
software, and if you install software without authorisation this process is
bypassed. You then put the organisation at risk of legal action from the owner
of the software.
Any ‘free’ software could be an illegal copy, or it could be trial software with an
expiry date. Even if neither of these things apply, the software is likely to be
for single personal use and require a licence for corporate use.
39
16/02/2016
Introduction to Information Governance e-learning module
Remember: Do not install software from the internet, from free CDs etc,
unless you have been authorised to do so.
Securing Access to Information
Who do you think is responsible for securing information in your workplace?




Senior Management staff
Receptionists
Nurses
Doctors
Summary
You’ve reached the end of this topic. Here are the key steps you can take to
secure access to information, in and out of the workplace.
Protect patient information and other sensitive information from unauthorised
access, destruction or loss by:








ensuring paper and electronic records are secure
choosing an effective password
avoiding inappropriate disclosures
ensuring the organisation building is secure
deleting spam without opening it
never downloading software unless authorised
using IT equipment responsibly
knowing how to report suspected and actual breaches of security.
Remember, everyone is responsible for securing information in your
workplace. See your organisation’s Information Governance or IT policy
specific to your area.
Summary – Information Governance
This module has given an overview of Information Governance (IG).
You’ve reached the end of the module "Introduction to Information
Governance for NHS".
Information governance allows organisations and individuals to ensure
information is processed legally, securely, efficiently and effectively. IG
40
16/02/2016
Introduction to Information Governance e-learning module
applies to all the types of information which your organisation may process,
but the rules may differ according to the type of information concerned.
Summary - Responsibilities
Remind yourself of the answers to these questions.
Who is responsible?
Remember: everyone is responsible for Information Governance and for:





providing a confidential service to patients, sharing information lawfully
and appropriately
recording information accurately and ensuring it is accessible when
needed
ensuring that information is held securely
processing information in accordance with the ‘data protection rules’
and respecting the rights of individuals
complying with Freedom of Information requirements
Where can I get advice about confidentiality?
If you need any advice about confidentiality issues, you should refer to the:





IG Lead or Caldicott Guardian in your organisation
Care Record Guarantee which sets out our commitments to patients
six Caldicott principles for handling patient information
Confidentiality NHS Code of Practice
Information Governance Toolkit.
How do I comply with good record keeping principles?
When you enter information into a record or document, ensure it is:



accurate
legible
written at the time an event occurred.
When you are responsible for storage of files or documents, make sure you
use a logical naming and filing system so that they are easy to locate and
retrieve.
For more in-depth information about records management principles, see
Records Management NHS Code of Practice in "Read More About It".
How can I keep information secure?
When you enter information into a record or document, ensure it is:


choose a secure password, and keep it private
lock away files when they are not in use
41
16/02/2016
Introduction to Information Governance e-learning module


delete spam emails without opening them
never use unauthorised software.
Are there any tools that will help?
Look at your organisation’s Information Governance or IT policy specific to
your area for the security standards you need to meet. In general you should:
The Information Governance Toolkit is an online tool that aims to support
NHS organisations in handling information correctly. The Toolkit:




encourages staff to work together and share knowledge
assists organisations to develop strategies and policies
provides a number of resources that can help with the handling of
information
contains a set of standards for information handling that organisations
can rate themselves against.
.
Relevant legislation
There are two pieces of legislation that you need to be aware of when thinking
about Information Governance..
The Data Protection Act 1998
This Act states that information should be:








processed fairly and lawfully
processed for a specified purpose
adequate, relevant and not excessive
accurate and kept up-to-date
not kept for longer than necessary
processed in accordance with rights of data subject
protected by appropriate security
only transferred outside the EEA with adequate protection.
The Freedom of Information Act 2000
42
16/02/2016
Introduction to Information Governance e-learning module
This Act gives the public the right to request any information held by any type
of public authority or healthcare organisation.



These requests must be made in writing
Organisations must respond within 20 working days
Each organisation must have an FOI lead that is trained in dealing with
these requests.
If your job requires you to deal with FOI requests you are advised to
participate in a more advanced training package.
The next step is to take an assessment on this module once you have
completed all the topics. It is recommended that you have a quick revision
session before attempting the assessment to help you achieve the final pass
mark of 80%.
What do I do now?
Access Training Tracker to take your test
If you already have a username and password you can log into training
tracker and start your test via this link http://iow.trainingtracker.co.uk. A
link to Training Tracker can also be found on:
 Intranet Homepage
 Learning Zone
 E- Learning
To obtain a username and password, please contact Development &
Training on extension 5409, and we will ensure that the details are e-mailed
to you as soon as possible, usually within 24 hours.
If you have any difficulties with logging in please do not hesitate to contact us
on the above number.
IF YOU DO NOT FEEL CONFIDENT USING A COMPUTER AND
WOULD LIKE ONE TO ONE SUPPORT AND GUIDANCE PLEASE
CONTACT US ON THE ABOVE NUMBER AND WE CAN ARRANGE FOR
AN IT TRAINER TO HELP YOU TO LOG ON AND TAKE YOUR TEST
43
16/02/2016
Download